What is the function of the python script?

Refer to the exhibit. What is the function of the python script?A . Count and print the total number of available devices.B . Iterate over a list of network devices and write all device names and management IP addresses to an output file.C . Iterate over a list of network...

November 26, 2020 No Comments READ MORE +

What is the purpose of the Cisco VIRL software tool?

What is the purpose of the Cisco VIRL software tool?A . To verify configurations against compliance standardsB . To simulate and model networksC . To automate API workflowsD . To test performance of an applicationView AnswerAnswer: B Explanation: Reference: https://www.speaknetworks.com/cisco-virl-better-gns3/

November 26, 2020 No Comments READ MORE +

Which two encoding formats do YANG interfaces support?

Which two encoding formats do YANG interfaces support?A . JSONB . XMLC . XHTMLD . Plain textE . BERView AnswerAnswer: A,B Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/prog/configuration/171/b_171_programmability_cg/model_driven_telemetry.html

November 25, 2020 No Comments READ MORE +

Which detail is included in a routing table?

Which detail is included in a routing table?A . IP protocolB . Broadcast addressC . TCP or UDP port numberD . Destination next hop or outgoing interfaceView AnswerAnswer: D Explanation: Reference: https://geek-university.com/ccna/routing-table-explained/

November 24, 2020 No Comments READ MORE +

Which is an advantage of using network programmability?

Which is an advantage of using network programmability?A . It removes CLI access for devices.B . It provides for more scalable and replicable network provisioning.C . Manual configuration is faster.D . No cloud abstraction occurs.View AnswerAnswer: B

November 24, 2020 No Comments READ MORE +

Drag and drop elements of the RESTCONF protocol stack from the left onto the correct description on the right. Not all elements on the left are used

DRAG DROP Drag and drop elements of the RESTCONF protocol stack from the left onto the correct description on the right. Not all elements on the left are used. View AnswerAnswer: Explanation: 1 C B, 2 C E, 3 - F Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/prog/configuration/169/b_169_programmability_cg/restconf_programmable_interface.html

November 24, 2020 2 Comments READ MORE +

What is the Git command to delete a local branch named “experiment” without a warning?

What is the Git command to delete a local branch named “experiment” without a warning?A . git branch Cn experimentB . git branch Crm experimentC . git branch Cf experimentD . git branch CD experimentView AnswerAnswer: D Explanation: Reference: https://www.atlassian.com/git/tutorials/using-branches

November 23, 2020 No Comments READ MORE +

In python, which expression checks whether the script returns a success status code when the Requests library is used?

In python, which expression checks whether the script returns a success status code when the Requests library is used?A . response.status_code== requests.okB . response.status_code== requests.codes.okC . response.code== requests.codes.okD . response.status_code ! == requests.codes.okView AnswerAnswer: B Explanation: Reference: https://realpython.com/python-requests/

November 23, 2020 No Comments READ MORE +

Drag and drop the Bash commands from the left onto the correct actions on the right

DRAG DROP Drag and drop the Bash commands from the left onto the correct actions on the right. View AnswerAnswer:

April 4, 2020 1 Comment READ MORE +

What are two security benefits of a Docker-based application? (Choose two.)

What are two security benefits of a Docker-based application? (Choose two.)A . natively secures access to secrets that are used by the running applicationB . guarantees container images are secured and free of vulnerabilitiesC . easier to patch because Docker containers include only dependencies that the application requiresD . prevents...

April 3, 2020 3 Comments READ MORE +